Skip to content

Commit fede5ad

Browse files
authored
Merge pull request #207936 from mbender-ms/avnm-typos
AVNM - Typo and links
2 parents 5238c63 + f6e1806 commit fede5ad

File tree

2 files changed

+2
-1
lines changed

2 files changed

+2
-1
lines changed

articles/virtual-network-manager/concept-security-admins.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,6 @@ Based on the industry study and suggestions from Microsoft, below is what we rec
6464
| 5900| TCP | VNC Remote Frame Buffer over HTTP |
6565
| 11211 | UDP | Memcached |
6666

67-
Learn how to block
6867
## Security admin rules vs. NSGs
6968

7069
Security admin rules are similar to NSG rules in structure and the parameters they intake, but as we’ve explored so far, they’re not the exact same construct. The first difference is intended audience – admin rules are intended to be used by network admins of a central governance team, thereby delegating NSG rules to individual application or service teams to further specify security as needed. With these intentions, admin rules were designed to have a higher priority than NSGs and therefore be evaluated before NSG rules. Admin rules also include another action type of “Always Allow”, which allows the specified traffic through to its intended destination and terminates further (and possibly conflicting) evaluation by NSGs rules. Admin rules are also applied not only to a network group’s existing VNets but also to newly provisioned resources, as described in the previous section. Admin rules are currently applied at the VNet level, whereas NSGs can be associated at the subnet and NIC level. The table below shows these differences and similarities:

articles/virtual-network-manager/how-to-block-high-risk-ports.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ ms.custom: template-how-to #Required; leave this attribute/value as-is.
1313

1414
In this article, you'll learn to block high risk network ports using [Azure Virtual Network Manager](overview.md) and Security Admin Rules. You'll walk through the creation of an Azure Virtual Network Manager instance, group your virtual networks (VNets) with [network groups](concept-network-groups.md), and create & deploy security admin configurations for your organization. You'll deploy a general block rule for high risk ports. Then you'll create an exception for managing a specific application's VNet. This allows you to manage access to the application VNets using network security groups.
1515

16+
While this article focuses on a single port, SSH, you can use protect any high-risk ports in your environment with the same steps. To learn more, review this list of [high risk ports](concept-security-admins.md#protect-high-risk-ports)
17+
1618
> [!IMPORTANT]
1719
> Azure Virtual Network Manager is currently in public preview.
1820
> This preview version is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities.

0 commit comments

Comments
 (0)